NEWS
How the evolution of tokenization can be utilised to better protect data

Traditionally, methods of data protection have focused on locking up their sensitive information away until it was deprotected to be used. While this may work for data that serves no current purpose, simply locking away the data greatly reduces its value, especially if the risks of loss of business...

Read More
NEWS
Securing the cloud: how to address new security risks and future-proof operations post-COVID-19

How can organisations overcome today’s cyber security challenges to protect systems and data within and across multiple cloud environments – and underpin new ways of working since COVID-19? By Phil Aitchison, Chief Operating Officer, Big Data & Security UK&I at Atos.

Read More
NEWS
Are increasing data breaches leaving consumers desensitised?

Cyberattacks are on the rise, with novel cybersecurity risks emerging as companies are currently forced to do business in unprecedented ways. By Stefanie Wood Ellis, AntiFraud Product & Marketing Director, OpSec Security.

Read More
NEWS
Cloud-based multi-factor authentication: the starting point for security, compliance and user experience

Banks and businesses are constantly under pressure to keep their data, customers, and employees secure. This has heightened in the last few months, as the global pandemic has seen cybercriminals ramp up activity. The number of phishing websites increasing by 350% since the start of the year, and...

Read More
NEWS
What to look for in a Next-Gen PAM solution

By Alan Radford, PAM Field Strategist, One Identity.

Read More
NEWS
Five factors that form how Security Awareness training programs are developing

By Elena Molchanova, Head of Security Awareness Marketing, Kaspersky.

Read More
NEWS
What’s next for cybersecurity?

A recent HP panel discussion sought to provide some answers to this question – topics covered...

Read More
NEWS
The attack that changed the world of cyber security for ever

You may be surprised to learn that one of the first computer viruses to bring millions of computers...

Read More
NEWS
Zero Trust Network Access (ZTNA) vs VPNs: The new era of securing your workforce during crisis

By Salvatore Sinno, Chief Security Architect and Director of Cybersecurity Innovation, Unisys.

Read More
NEWS
Trend EDR: Protecting endpoints proactively

How IT managers protect corporate networks from targeted attacks By Chris Connell, Deputy Vice...

Read More

Videos

Gina Archbold, Channel Business Manager at BlueSnap, provides an update on the company’s Partner Program - explaining how the BlueSnap global payment orchestration platform provides an integrated, single...
In this video, DCS talks to Teksan at the DCA's 10x10 2025
Steve Wilson, Chief AI and Product Officer at Exabeam, discusses the company’s recent report, From Hype to Help: How AI Is (Really) Transforming Cybersecurity in 2025, explaining that there’s no shortage...
Andreas Keiger, Chief Revenue Officer at ZutaCore, discusses the AI power density challenge facing data centre owners and operators, looking at the various liquid cooling options available to address the...

News

UK startup Sitehop leverages in-house testing to enhance their quantum encryption platform, boosting speed and efficiency with the Xena Loki 100G solution.
Forescout's latest report sheds light on skyrocketing ransomware attacks, zero-day exploits, and increased targeting of unconventional devices.
Fortinet’s Fabric-Ready Technology Alliance has achieved over 3,000 integrations, empowering enterprises to bolster security amidst digital transformation challenges.
The 2025 Global Data Center Survey by Uptime Institute presents an industry at a crossroads of innovation and logistical challenges, underscored by rising costs and shifting demands.